Security should be foremost on every database developer’s mind, and given a little thought and know-how, it’s not difficult to develop fairly secure code. The only trouble is that it’s VERY easy to develop code which can be exploited in some way, maybe with disastrous results.This article isn’t about database security in general, that’s far too big a subject to cover in a few pages of XHTML, but about a specific issue which is probably the most common database and application exploit.